Compare commits

..

10 Commits

Author SHA1 Message Date
Lutchy Horace 94835e5a3c Closes #10 2023-06-07 07:29:13 -04:00
Lutchy Horace 0d4a01c97b Merge branch '9-update_firewall-sh-can-intermitten-failures-if-it-s-unable-to-resolve-fwgw-lhprojects-net' into 'master'
Resolve "update_firewall.sh can intermitten failures if it's unable to resolve fwgw.lhprojects.net"

Closes #9

See merge request lhprojects-information-network/scripts!7
2023-06-06 22:56:44 +00:00
Lutchy Horace d98e74b036 Resolve "update_firewall.sh can intermitten failures if it's unable to resolve fwgw.lhprojects.net" 2023-06-06 22:56:44 +00:00
Lutchy Horace 421b9a57cc Moved /srv/http-combined-content to /srv/www/http-combined-content 2022-05-11 18:55:27 -04:00
Lutchy Horace c1499d5e74 Set +x to update_firewall.sh 2022-05-11 18:48:08 -04:00
Lutchy Horace 178fa8e5dd Refactor createVhosts.sh script
* Fixed line breaks
* Remove duplicate block
* Added error message to the cleanup process, conf dir
is missing.
2022-05-11 18:47:39 -04:00
Lutchy Horace be51283e33 Merge branch '6-a-script-that-updates-the-firewall-when-a-source-ip-changes' into 'master'
Resolve "A script that updates the firewall when a source IP changes"

Closes #6

See merge request lhprojects-information-network/scripts!5
2022-05-11 16:57:36 +00:00
Lutchy Horace 63c1ca72e3 Initial draft 2022-05-11 12:43:18 -04:00
Lutchy Horace a44a673758 Merge branch '4-refactor-createvhosts-sh' into 'master'
Resolve "Refactor createVhosts.sh"

Closes #4

See merge request lhprojects-information-network/scripts!3
2021-11-11 22:29:14 +00:00
Lutchy Horace 6f757f2ab7 Let's keep spaces consistent 2021-11-11 17:13:39 -05:00
2 changed files with 138 additions and 32 deletions

View File

@ -23,6 +23,12 @@ function usage
echo " Do not redirect HTTP to HTTPS"
echo " --servicename"
echo " The Nginx server service name to use to reload"
echo " --standalone"
echo " Instead of webroot, use acme.sh builtin server"
echo " --bindaddress"
echo " Listening address for acme.sh builtin server. Default is 0.0.0.0"
echo " --bindport"
echo " Listening port for acme.sh builtin server. Default is 8999"
echo " -d | --debug"
echo " Enable debug logging"
echo " -h | --help"
@ -38,7 +44,14 @@ function get_cert
if [ "$DEBUG" = "1" ]; then
_debug_arg="--debug"
fi
/root/.acme.sh/acme.sh --issue --domain "$_domain" --webroot /srv/http-content-combined/ --cert-file /etc/ssl/"${_domain}".crt --key-file /etc/ssl/"${_domain}".key --fullchain-file /etc/ssl/"${_domain}"-fullchain.crt $_debug_arg
# set args for what mode acme.sh is going to run in
if [ "$_standalone" = true ]; then
_mode="--standalone --local-address $_bindaddress --httpport $_bindport"
else
_mode="--webroot $web_root"
fi
/root/.acme.sh/acme.sh --issue --domain "$_domain" $_mode --cert-file /etc/ssl/"${_domain}".crt --key-file /etc/ssl/"${_domain}".key --fullchain-file /etc/ssl/"${_domain}"-fullchain.crt --server letsencrypt $_debug_arg
return $?
}
@ -69,7 +82,7 @@ function clean_up
function verify_vhost
{
local target=127.0.0.1
local verify_path=/srv/http-content-combined/.well-known/
local verify_path=$web_root/.well-known/
local verify_file_name=verify.$_domain.html
local verify_full_path=$verify_path$verify_file_name
local http_code
@ -90,10 +103,12 @@ function verify_vhost
fi
}
## define varables
_cwd="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )"
_bootstrap=${_cwd}/bootstrap.sh
_bb_myname=$(basename "$0")
_bb_mypath=$(realpath $BASH_SOURCE)
web_root=/srv/www/webroot
# Init script
if test -f "$_bootstrap"; then
@ -111,7 +126,7 @@ fi
# gain priviledges
become "$@"
OPTS=$(getopt -o h,d -l domain:,root:,backend:,listenip:,desc:,donotredirect,servicename:,confpath:,debug -n 'createVhosts' -- "$@")
OPTS=$(getopt -o h,d -l domain:,root:,backend:,listenip:,desc:,donotredirect,servicename:,confpath:,standalone,bindaddress:,bindport:,debug -n 'createVhosts' -- "$@")
if [ "$?" -gt '0' ]; then
echo 'Failed to set command line arguments'
exit 1;
@ -126,6 +141,10 @@ _backend=""
_listenip=""
_debug=false
_servicename=nginx
_confpath=/etc/nginx
_standalone=false
_bindaddress=0.0.0.0
_bindport=8999
while true; do
case "$1" in
--domain )
@ -152,6 +171,15 @@ while true; do
--confpath )
_confpath=$2
shift ;;
--standalone )
_standalone=true
shift ;;
--bindaddress )
_bindaddress=$2
shift ;;
--bindport )
_bindport=$2
shift ;;
-d | --debug )
_debug=true
shift ;;
@ -185,31 +213,20 @@ if test -n "$_root"; then
_rootpath="root $_root;"
fi
_check_host=success
_check_host=failed
_locationblock_http=""
_locationblock_https=""
if test -n "$_backend"; then
echo "Verifying backend(s)..."
if ! validate_host "$_backend"; then
_check_host=failed
fi
# Include backend for HTTP traffic if donotredirect is enabled
#
if [ "$_donotredirect" = "true" ]; then
##Begin HEREDOC
_locationblock_http=$(cat <<- EOF
proxy_pass $_backend;
include proxy_params;
EOF
)
##End HEREDOC
if validate_host "$_backend"; then
_check_host=success
fi
if [ "$_check_host" = "success" ]; then
# Include backend for HTTP traffic if donotredirect is enabled
#
if [ "$_donotredirect" = "true" ]; then
##Begin HEREDOC
_locationblock_http=$(cat <<- EOF
proxy_pass $_backend;
@ -217,6 +234,7 @@ _locationblock_http=$(cat <<- EOF
EOF
)
##End HEREDOC
fi
##Begin HEREDOC
@ -226,6 +244,7 @@ _locationblock_https=$(cat <<- EOF
EOF
)
##End HEREDOC
else
err "Invalid hostname: $_backend. Not resolvable!"
fi
@ -257,7 +276,7 @@ if test -d "$_confpath"; then
echo "Yes!"
else
echo "No!"
clean_up
clean_up "Conf path doesn't exists!"
fi
##
@ -268,10 +287,10 @@ fi
## Begin issuing certificate
###########################################
echo -n "Checking if /srv/http-content-combined/ exists?"
if ! test -d /srv/http-content-combined; then
echo -n "Checking if $web_root exists? "
if ! test -d $web_root; then
echo "Creating..."
mkdir -p /srv/http-content-combined/
mkdir -p $web_root
else
echo "Yes!"
fi
@ -300,7 +319,7 @@ server {
access_log /var/log/nginx/${_domain}.access.log main;
location /.well-known {
root /srv/http-content-combined/;
root $web_root;
autoindex on;
}

87
update_firewall.sh Executable file
View File

@ -0,0 +1,87 @@
#!/usr/bin/env bash
# Copyright (C) 2021 by LHProjects <copyright@lhpmail.us>
#
# Permission is granted to use, copy, modify, and/or distribute this work for any purpose with or without fee. This work is offered as-is, with absolutely no warranty whatsoever. The author is not responsible for any damages that result from using this work.
#
#
# Updates FirewallD when my home IP address changes.
#
# Define variables
CACHE_IP_FILE=/var/cache/update_firewall.cache
get_home_ip () {
tmpfile=$(mktemp)
for i in {1..5};
do
host fwgw.lhprojects.net 1.1.1.1 > $tmpfile && s=0 && break || s=1 && sleep 3;
done
if [ $s -eq 0 ]; then
HOME_IP=$(cat $tmpfile | cut -d ' ' -f 4 | xargs)
else
echo "Error: Can't resolve fwgw.lhprojects.net"
rm $tmpfile
exit 1
fi
rm $tmpfile
}
remove_ip () {
# remove old entry
firewall-cmd --permanent --ipset=node_ips --remove-entry=$1 &> /dev/null
# reload firewall
firewall-cmd --reload &> /dev/null
}
add_ip () {
# add new entry
firewall-cmd --permanent --ipset=node_ips --add-entry=$1 &> /dev/null
# reload firewall
firewall-cmd --reload &> /dev/null
}
write_ip_cache () {
echo "$1" > $CACHE_IP_FILE
}
update_firewall () {
# check if cache IP is in the ipset entries
ipset_entries=$(firewall-cmd --ipset=node_ips --get-entries 2> /dev/null)
found=false
for ip in $ipset_entries; do
if [ "$ip" = "$1" ]; then
found=true
fi
done
if [ "$found" = false ]; then
echo "Error: IP '$1' not found in firewall entries."
echo "Info: Updating IP in firewall."
add_ip $HOME_IP
fi
}
# Get home ip
get_home_ip
# Check if we have cache IP
if test -f $CACHE_IP_FILE; then
CACHE_IP=$(cat $CACHE_IP_FILE)
if [ -z "$CACHE_IP" ]; then
update_firewall $HOME_IP
write_ip_cache $HOME_IP
elif [ "$HOME_IP" != "$CACHE_IP" ]; then
remove_ip $CACHE_IP
update_firewall $HOME_IP
write_ip_cache $HOME_IP
fi
else
update_firewall $HOME_IP
write_ip_cache $HOME_IP
fi
exit 0